期刊文献+

支持身份认证的数据持有性证明方案 被引量:2

Provable data possession scheme with authentication
下载PDF
导出
摘要 针对云应用场景中身份认证和数据持有性证明的双重需求,提出一种支持身份认证的数据持有性证明方案。基于数据标签签名和随机数复用,新方案通过3次交互即可实现用户对云持有数据的完整性验证、用户与云服务器之间的双向身份认证以及会话密钥协商与确认。与使用认证密钥协商和数据持有性证明的组合方案相比,新方案具有较少的运算量和交互轮次以及可证明的安全性。在随机预言机模型下,基于计算性Diffie-Hellman问题假设,给出方案的安全性证明。 To satisfy the requirements of identity authentication and data possession proven in the cloud application sce- narios, a provable data possession scheme with authentication was proposed. Based on data tag signature and randomness reusing, the proposed scheme could accomplish several issues with three interactions, including the possession proof of cloud data, the mutual authentication between user and cloud computing server, the session key agreement and confirma- tion. Compared to the simple combination of authentication key agreement and provable data possession schemes, the proposed scheme has less computation and interactions, and better provable securities. In the random oracle model, the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.
出处 《通信学报》 EI CSCD 北大核心 2016年第10期117-127,共11页 Journal on Communications
基金 国家自然科学面上基金资助项目(No.61170251) 国家高技术研究发展计划("863"计划)基金资助项目(No.2015AA016007) 国家自然科学基金-广东联合基金资助项目(No.U1401251)~~
关键词 认证 数据持有 云计算 可证明安全 随机预言机 authentication, data possession, cloud computing, provable security, random oracle
  • 相关文献

参考文献20

  • 1BUYYA R, YEO C S, VENUGOPAL S, et al. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering compu-ting as the 5th utility[J]. Future Generation Computer Systems, 2009, 25(6):599 -616.
  • 2WU J, SHEN Q, WANG T, et al. Recent advances in cloud security[J]. Journal of Computers, 2014, 5(10):2156-2163.
  • 3ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data posses-sion at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, 2007: 598-609.
  • 4BOWERS K D, JUELS A, OPREA A. Proofs of retrievability: theory and implementation[C]// ACM Cloud Computing Security Workshop, CCSW 2009. Chicago, Il, USA, 2009:43-54.
  • 5CHOUDHURY A J, KUMAR P, SAIN M, et al. A strong user authenti-cation framework for cloud computing[C]// IEEE Asia-Pacific Services Computing Conference. Jeju, Korea, 2011: 110-115.
  • 6LIU C, CHEN J, YANG L T, et al. Authorized public auditing of dy-namic big data storage on cloud with efficient verifiable fine-grained updates[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(9):2234-2244.
  • 7GRITTI C, SUSILO W, PLANTARD T. Efficient dynamic provable data possession with public verifiability and data privacy[M]// Infor-mation Security and Privacy. Springer International Publishing, 2015:395-412.
  • 8WANG B, LI B, LI H. Panda: public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Servic-es Computing, 2015 (1): 92-106.
  • 9SHEN S T, ZENG W G. Delegable provable data possession for re-mote data in the clouds[M]// Information and Communications Secu-rity. Springer Berlin Heidelberg, 2011:93-111.
  • 10WANG H. Proxy provable data possession in public clouds[J]. IEEE Transactions on Services Computing, 2013, 6(4):551-559.

同被引文献13

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部